É«½ç°É

In our digital age, where technology is an integral part of our daily work and personal lives, understanding and practicing good cybersecurity is more crucial than ever.

We all play a role in protecting our institutions' data and information assets. To empower you with the knowledge and skills necessary to navigate this digital landscape securely, we are thrilled to introduce a series of concise 3-minute cybersecurity courses tailored for all staff members.

These courses cover essential topics such as you being the shield as our first line of defense,  email security, phishing awareness,  and social engineering. They are thoughtfully designed to provide you with practical insights and best practices that can be immediately applied to your daily work. By participating in these courses, you will not only enhance your personal cybersecurity but also contribute to the overall security and resilience of our É«½ç°É community.

We encourage all staff members to explore these courses at your convenience. They are structured to fit seamlessly into your busy schedules, offering a flexible and accessible way to improve your cybersecurity awareness and skills. Together, we can create a safer digital environment for our organization, protect sensitive information, and ensure the success of É«½ç°É.

Let's embark on this journey together, enhancing our collective cybersecurity expertise and ensuring that É«½ç°É remains a secure and thriving institution.

Thank you for your commitment to the security and success of É«½ç°É.

Illustration of a laptop with a shield

"You Are the Shield": Personal Cybersecurity

In this short but impactful course, you'll learn essential cybersecurity practices to protect your personal information, online identity, and digital assets from a range of threats. No technical background required – just a desire to enhance your online safety.

   

Course Details

Duration: 1 video (3 minutes)

Format: Quick video lesson

Prerequisites: None – Suitable for all levels

Course Objectives

After watching our concise video, you will:

  • Understand Your Role:
    • Recognize your crucial role as the first line of defense in personal cybersecurity.
    • Understand the importance of being proactive in safeguarding your digital life.
  • Identify Common Threats:
    • Learn about common cyber threats, such as phishing, malware, and identity theft.
    • Understand how these threats can compromise your online security.
  • Password Management:
    • Discover effective password management strategies.
    • Learn how to create strong, unique passwords and use password managers.
  • Secure Browsing:
    • Gain insights into safe browsing habits and recognizing malicious websites.
    • Learn about browser extensions and tools that enhance your online safety.
  • Privacy Protection:
    • Explore the importance of protecting your personal information and online privacy.
    • Learn how to adjust privacy settings on social media and other online platforms.
  • Regular Updates:
    • Understand the significance of keeping your devices and software up to date.
    • Learn how software updates patch vulnerabilities that could be exploited by attackers.

In just three minutes, you'll become your own cybersecurity advocate, equipped with the knowledge and practices to defend against digital threats. Join us for this quick course to take control of your online security and confidently navigate the digital world. You are the shield that protects your digital life – let's get started!

Illustration of an email with a fishing hook

Email Security and Phishing Awareness

In an age where email is a primary communication tool, it's crucial to understand the risks associated with it. This course will empower you with the knowledge and skills to identify phishing attempts, protect your email account, and keep your digital life secure.

    

Course Details

Duration: 1 video (3 minutes)

Format: Quick video lesson

Prerequisites: None – Suitable for all levels

Course Objectives:

After watching our brief video, you will:

  • Email Security Basics:
    • Gain an understanding of the importance of email security.
    • Learn how email attacks can compromise your personal and professional information.
  • Recognize Phishing:
    • Learn to identify common signs of phishing emails.
    • Understand the techniques cybercriminals use to deceive recipients.
  • Safe Email Practices:
    • Discover best practices for keeping your email account secure.
    • Learn how to create strong passwords and enable two-factor authentication (2FA).
  • Phishing Defense:
    • Understand strategies to protect yourself against phishing attacks.
    • Learn how to verify the authenticity of email senders and URLs.
  • Reporting and Response:
    • Learn how to report phishing attempts to your email provider.
    • Understand what to do if you fall victim to a phishing scam.
  • Staying Informed:
    • Recognize the importance of staying informed about the latest phishing techniques.
    • Learn where to find resources and updates on email security.

In just three minutes, you'll become better equipped to navigate the email landscape securely and protect yourself from phishing attacks. Join us for this quick course to enhance your email security awareness and keep your inbox free from digital threats. Your email account is a valuable asset – let's keep it safe!

Illustration of masked person and an unmasked person holding laptops

Social Engineering Awareness

In this concise yet informative course, you'll learn to recognize and defend against various social engineering techniques used to manipulate individuals into divulging sensitive information or taking malicious actions. Strengthen your cybersecurity defenses by understanding the human element of cyber threats.

   

Course Details

Duration: 1 video (3 minutes)

Format: Quick video lesson

Prerequisites: None – Suitable for all levels

Course Objectives

After watching our concise video, you will:

  • Define Social Engineering:
    • Understand what social engineering is and why it's a significant cybersecurity threat.
    • Recognize the psychological tactics employed by social engineers.
  • Common Techniques:
    • Explore various social engineering techniques, including phishing, pretexting, and baiting.
    • Learn how attackers manipulate human psychology to achieve their goals.
  • Red Flags:
    • Identify red flags and warning signs that may indicate a social engineering attempt.
    • Understand the importance of skepticism and verification.
  • Protecting Yourself:
    • Discover strategies to protect yourself against social engineering attacks.
    • Learn how to verify the identity of individuals and requests for information.
  • Reporting Incidents:
    • Understand the importance of reporting social engineering attempts to your organization.
    • Learn how timely reporting can prevent further cyber threats.
  • Awareness and Training:
    • Recognize the value of ongoing awareness and training in combating social engineering.
    • Learn where to find additional resources and updates on social engineering tactics.

In just three minutes, you'll gain valuable insights into the world of social engineering and be better equipped to defend against these manipulative tactics. Join us for this quick course to enhance your awareness of social engineering threats and become a more vigilant and secure digital citizen. Your knowledge is your shield against social engineering attacks!

 

 

Contact ITS
Academic Commons

1st Floor, Suite 116